Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics

被引:30
作者
Eberz, Simon [1 ]
Rasmussen, Kasper B. [1 ]
Lenders, Vincent [2 ]
Martinovic, Ivan [1 ]
机构
[1] Univ Oxford, Oxford, England
[2] Armasuisse, Bern, Switzerland
来源
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015) | 2015年
基金
英国工程与自然科学研究理事会;
关键词
SACCADIC INTRUSIONS; PUPIL DIAMETER; MICROSACCADES; INFORMATION; DYNAMICS;
D O I
10.14722/ndss.2015.23203
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We introduce a novel biometric based on distinctive eye movement patterns. The biometric consists of 21 features that allow us to reliably distinguish users based on differences in these patterns. We leverage this distinguishing power along with the ability to gauge the users' task familiarity, i.e., level of knowledge, to address insider threats. In a controlled experiment we test how both time and task familiarity influence eye movements and feature stability, and how different subsets of features affect the classifier performance. These feature subsets can be used to tailor the eye movement biometric to different authentication methods and threat models. Our results show that eye movement biometrics support reliable and stable identification and authentication of users. We investigate different approaches in which an attacker could attempt to use inside knowledge to mimic the legitimate user. Our results show that while this advance knowledge is measurable, it does not increase the likelihood of successful impersonation. In order to determine the time stability of our features we repeat the experiment twice within two weeks. The results indicate that we can reliably authenticate users over the entire period. We show that the classification decision depends on all features and mimicking a few of them will not be sufficient to trick the classifier. We discuss the advantages and limitations of our approach in detail and give practical insights on the use of this biometric in a real-world environment.
引用
收藏
页数:13
相关论文
共 47 条
[1]   Characteristics of saccadic intrusions [J].
Abadi, R ;
Gowen, E .
VISION RESEARCH, 2004, 44 (23) :2675-2690
[2]  
[Anonymous], 2007, EYE TRACKING METHODO
[3]  
[Anonymous], 2012, P 3 USENIX WORKSH HL
[4]  
[Anonymous], 2011, P 6 ACM S INFORM COM, DOI [10.1145/1966913.1966983, DOI 10.1145/1966913.1966983]
[5]  
[Anonymous], 2011, CYBERSECURITY WATCH
[6]  
[Anonymous], 2012, WMCS201206
[7]   Biometric Authentication and Identification using Keystroke Dynamics: A Survey [J].
Banerjee, Salil P. ;
Woodard, Damon L. .
JOURNAL OF PATTERN RECOGNITION RESEARCH, 2012, 7 (01) :116-139
[8]  
Barral C, 2009, LECT NOTES COMPUT SC, V5458, P57
[9]  
Boehm A., 2013, IEEE PRISMS 2013
[10]  
Cantoni V, 2014, PATTERN RECOGN